Chapter 11. Using Access Control Lists for Threat Mitigation

You can use an access control list (ACL) in many different ways, including identifying traffic in a class map for a Zone-Based Firewall on the IOS router or in a class map on an Adaptive Security Appliance (ASA) firewall. You can also use an ACL to identify traffic that should be sent over a virtual private network (VPN), given priority treatment, or have Network Address Translation (NAT) performed. Many features rely on the ability of an ACL to identify (classify) traffic. ACLs can also be used to apply filtering. ...

Get CCNA Security 640-554 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.